We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Artificial Hygiene for Computer Systems

by Ashu Sharma, Neha Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 11
Year of Publication: 2012
Authors: Ashu Sharma, Neha Singh
10.5120/4868-7293

Ashu Sharma, Neha Singh . Artificial Hygiene for Computer Systems. International Journal of Computer Applications. 39, 11 ( February 2012), 45-48. DOI=10.5120/4868-7293

@article{ 10.5120/4868-7293,
author = { Ashu Sharma, Neha Singh },
title = { Artificial Hygiene for Computer Systems },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 11 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 45-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number11/4868-7293/ },
doi = { 10.5120/4868-7293 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:26:16.162951+05:30
%A Ashu Sharma
%A Neha Singh
%T Artificial Hygiene for Computer Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 11
%P 45-48
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Artificial Hygiene is the thought taken from the concept of hygiene in daily life. Hygiene is an old concept related to medical, as well as to personal and professional practices that are taken to be care related to most aspects of living. Hygiene practices that are employed as preventative measures to less incidence and spreading of disease, like hand hygiene cleaning the hands before taking food, respiratory hygiene covering the face with hands or hanky on sneezing, food and water hygiene-always put the food and drinking water covered, etc. so hygiene can also be applied on computer machines. So in Computer network, if a system in network is infected the artificial hygiene should ensure that unauthorized or malicious traffic never leaves the infected system/host to other in a network. Hygiene refers to the set of rules that an individual follows in a community to be associated with the preservation of healthy living for whole community that avoid or reduce disease and the spreading of disease in social society. Periodical hygienenical habits may be considered good practices by a society while the neglect of hygiene can be considered disgusting, disrespectful or even threatening. So for this we have to give some rules that an individual computer have to follow to impart hygiene to computers society that means computer network so that the system know how to behave against threat to protect itself as well as help others on the network so that other can also protect themselves from the threat.

References
  1. Talukder, A.; Rao, V.; Kapoor, V. & Sharma, D. 200.Artificial hygiene: a critical step towards safety from email viruses, India Annual Conference, 2004. Proceedings of the IEEE INDICON 2004. First, 2004, 484-489
  2. Goertzel, K. 2007. Software Security Assurance: A State-of-Art Report (SAR), DTIC Document.
  3. Katerinakis, T. 2010 Graduate Portfolio of Theodoros Katerinakis.
  4. Mell, P.; Kent, K.; Nusbaum, J.; of Standards, N. I. & (US), T. 2005. Guide to Malware Incident Prevention and Handling, US Dept. of Commerce, Technology Administration, National Institute of Standards and Technology.
  5. Erbschloe, M. 2005. Trojans, worms, and spyware: a computer security professional's guide to malicious code, Butterworth-Heinemann.
  6. Feinstein, K. 2004. How to Do Everything to Fight Spam, Viruses, Pop-Ups, and Spyware, McGraw-Hill, Inc.
  7. Grimes, R. 2001 Malicious mobile code: Virus protection for Windows, O'Reilly Media.
  8. Scambray, J. & McClure, S. 2007. Hacking Exposed Windows, Tata McGraw-Hill Education.
  9. Kirda, E.; Kruegel, C.; Banks, G.; Vigna, G. & Kemmerer, R. 2006 Behavior-based spyware detection Usenix Security Symposium.
  10. Talukder, A. & Chaitanya, M. 2008 Architecting secure software systems, Auerbach Publications.
Index Terms

Computer Science
Information Sciences

Keywords

Antivirus Digital society Eradication Hygiene Malwares